Risk

7/3/2018
08:32 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Jumios Netverify Solutions Win Gold and Bronze in Security Software

Award-winning technology recognized for market leading accuracy, machine learning and global growth.

PALO ALTO, Calif., July 03, 2018 (GLOBE NEWSWIRE) -- Jumio, the leading AI-powered trusted identity as a service provider, announced today that Network Products Guide, the industry's leading technology research and advisory guide, named its Netverify® solution a Gold winner in Information Security & Risk Management and Bronze winner for Security Software in the 13th Annual 2018 IT World Awards®.

Jumio’s Netverify solution is the global leader in trusted identity as a service and combines ID Verification, Identity Verification and Document Verification to confirm the real-world identity of online consumers. Netverify verifies ID documents issued by over 200 countries in real-time web and mobile transactions. Jumio’s award-winning technology was recognized because of its:

  • Market Leading Accuracy: Through a combination of computer vision, machine learning, biometrics, augmented intelligence and human review, Jumio has enabled the highest level of accuracy in deterring fraud while complying with AML, KYC, PSD2 and GDPR.
     
  • Machine Learning at Scale: Machine learning for online identity verification relies on having a large (ideally massive) database of good and bad (i.e., fraudulent) transactions. The larger the dataset, the smarter the algorithms. Jumio has performed over 120 million online verifications and has the largest database of identity verification transactions training its algorithms.
     
  • Global Growth: In Q1 2018, Jumio’s sales grew almost 400 percent year-over-year compared to the same quarter last year and it marked the fifth consecutive quarter of increased sales.

“We live in an increasingly digital world and it’s imperative that organizations verify a consumer’s digital identity matches their physical identity when conducting business online to mitigate fraud,” said Stephen Stuut, CEO of Jumio. “These awards from Network Products Guide are further validation that our Netverify solution is the most accurate and advanced solution on the market. The threat of data breaches has shaken the trust of consumers, and as a result, online identity verification is now a critical must-have for most online organizations.”

Jumio has had continuous momentum in 2018, as the company and its Netverify solution have won a number of industry awards including the 14th Annual Info Security Product Guide’s 2018 Global Excellence Awards®, 2018 Tech Trailblazers Awards, 2018 Cybersecurity Excellence Awards and Cyber Defense Magazines 2018 Infosec Awards.

Jumio will be honored in San Francisco on Monday, July 30, 2018 during the annual SVUS Red Carpet Awards Ceremony Dinner.

To learn more about Jumio’s award-winning solution, please visit: www.jumio.com/trusted-identity/netverify/.

About Jumio
When identity matters, trust Jumio. Jumio is the creator of Netverify® which enables businesses to increase customer conversions while providing a seamless customer experience and reducing fraud. By combining the three core solutions of ID Verification, Identity Verification and Document Verification, organizations now have a complete solution that allows them to establish the real-world identity of the consumer.

Leveraging advanced technology including biometric facial recognition, machine learning, artificial intelligence and human review, Jumio helps customers to meet regulatory compliance including KYC, AML and GDPR and tie the digital identity to the physical world. Jumio has verified more than 120 million identities issued by over 200 countries from real time web and mobile transactions. Jumio’s solutions are used by leading companies in the financial services, sharing economy, online gaming, cryptocurrency, higher education, retail, and travel sectors.

Based in Palo Alto, Jumio operates globally with offices in the US, Europe, and Asia Pacific and has been the recipient of numerous awards for innovation. For more information, please visit www.jumio.com.

About NPG’s IT World Awards
As industry’s leading technology research and advisory publication, Network Products Guide plays a vital role in keeping decision makers and end-users informed of the choices they can make in all areas of information technology. The Annual IT World Awards is part of the SVUS Awards® recognition program from Silicon Valley in the United States of America which also includes other programs such as CEO World Awards, Consumer World Awards, Customer Sales and Service World Awards, Golden Bridge Awards, Globee Awards, Info Security PG’s Global Excellence Awards, Pillar World Awards, PR World Awards, and Women World Awards. To learn more, visit www.networkproductsguide.com

Media Contacts
U.S. Media Contact
Jacquelyn Daane
10Fold Communications
[email protected]
415-800-5369

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
New Free Tool Scans for Chrome Extension Safety
Dark Reading Staff 2/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1944
PUBLISHED: 2019-02-21
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-For...
CVE-2018-1945
PUBLISHED: 2019-02-21
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click act...
CVE-2018-1946
PUBLISHED: 2019-02-21
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the stronges...
CVE-2018-1947
PUBLISHED: 2019-02-21
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure withi...
CVE-2018-1948
PUBLISHED: 2019-02-21
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to...